Skip to main content
Previous sectionNext section

Authorization

This section of the tutorial provides an introduction to authorization using InterSystems security. After completing this part of the tutorial, you will be able to:

  • List the different types of database assets protected by the InterSystems security system.

  • Create users, roles, and privileges.

  • Grant privileges to users by assigning them to roles.

  • Use the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.

Note:

For in-depth discussion of authorization using InterSystems security, see About InterSystems Authorization. See also Assets and Resources, Privileges and Permissions, Roles, Users, and Services.

Feedback